- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 26 for considered (0.05 seconds)
-
.github/ISSUE_TEMPLATE/20_contributor_feature_request.yml
- type: textarea id: context attributes: label: Context description: | How has this issue affected you? What are you trying to accomplish? What other alternatives have you considered? Providing context helps us come up with a solution that is most useful in the real world validations:Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Thu Nov 27 15:48:22 GMT 2025 - 1.5K bytes - Click Count (0) -
cmd/erasure-healing.go
} } return notFoundCount, nonActionableCount } // Object is considered dangling/corrupted if and only // if total disks - a combination of corrupted and missing // files is lesser than number of data blocks. func isObjectDangling(metaArr []FileInfo, errs []error, dataErrsByPart map[int][]int) (validMeta FileInfo, ok bool) { // We can consider an object data not reliable // when xl.meta is not found in read quorum disks.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 34.7K bytes - Click Count (0) -
cmd/erasure-healing-common.go
} var ( verifyErr error verifyResp *CheckPartsResp ) switch scanMode { case madmin.HealDeepScan: // disk has a valid xl.meta but may not have all the // parts. This is considered an outdated disk, since // it needs healing too. verifyResp, verifyErr = onlineDisk.VerifyFile(ctx, bucket, object, meta) default: verifyResp, verifyErr = onlineDisk.CheckParts(ctx, bucket, object, meta) }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 12K bytes - Click Count (0) -
ci/official/requirements_updater/numpy1_requirements/requirements_lock_3_11.txt
--hash=sha256:fe3b385d996ee0822fd46528d9f0443b880d4d05528fd26a9119a54ec3f91c69 # via -r ci/official/requirements_updater/requirements.in # The following packages are considered to be unsafe in a requirements file: setuptools==78.1.1 \ --hash=sha256:c3a9c4211ff4c309edb8b8c4f1cbfa7ae324c4ba9f91ff254e3d305b9fd54561 \ --hash=sha256:fcc17fd9cd898242f6b4adfaca46137a9edef687f43e6f78469692a5e70d851dCreated: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Mon Dec 15 16:23:21 GMT 2025 - 66.1K bytes - Click Count (1) -
requirements_lock_3_10.txt
--hash=sha256:fe3b385d996ee0822fd46528d9f0443b880d4d05528fd26a9119a54ec3f91c69 # via -r ci/official/requirements_updater/requirements.in # The following packages are considered to be unsafe in a requirements file: setuptools==78.1.1 \ --hash=sha256:c3a9c4211ff4c309edb8b8c4f1cbfa7ae324c4ba9f91ff254e3d305b9fd54561 \ --hash=sha256:fcc17fd9cd898242f6b4adfaca46137a9edef687f43e6f78469692a5e70d851dCreated: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Mon Dec 08 17:43:36 GMT 2025 - 67.7K bytes - Click Count (0) -
requirements_lock_3_9.txt
--hash=sha256:fe3b385d996ee0822fd46528d9f0443b880d4d05528fd26a9119a54ec3f91c69 # via -r ci/official/requirements_updater/requirements.in # The following packages are considered to be unsafe in a requirements file: setuptools==78.1.1 \ --hash=sha256:c3a9c4211ff4c309edb8b8c4f1cbfa7ae324c4ba9f91ff254e3d305b9fd54561 \ --hash=sha256:fcc17fd9cd898242f6b4adfaca46137a9edef687f43e6f78469692a5e70d851dCreated: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Mon Dec 08 17:43:36 GMT 2025 - 66.6K bytes - Click Count (0) -
cmd/streaming-signature-v4.go
var errLineTooLong = errors.New("header line too long") // malformed encoding is generated when chunk header is wrongly formed. var errMalformedEncoding = errors.New("malformed chunked encoding") // chunk is considered too big if its bigger than > 16MiB. var errChunkTooBig = errors.New("chunk too big: choose chunk size <= 16MiB") // newSignV4ChunkedReader returns a new s3ChunkedReader that translates the data read from r
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 18.2K bytes - Click Count (0) -
ci/official/requirements_updater/numpy1_requirements/requirements_lock_3_9.txt
--hash=sha256:fe3b385d996ee0822fd46528d9f0443b880d4d05528fd26a9119a54ec3f91c69 # via -r ci/official/requirements_updater/requirements.in # The following packages are considered to be unsafe in a requirements file: setuptools==78.1.1 \ --hash=sha256:c3a9c4211ff4c309edb8b8c4f1cbfa7ae324c4ba9f91ff254e3d305b9fd54561 \ --hash=sha256:fcc17fd9cd898242f6b4adfaca46137a9edef687f43e6f78469692a5e70d851dCreated: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Mon Dec 15 16:23:21 GMT 2025 - 65.9K bytes - Click Count (0) -
cmd/erasure.go
// reportability of offline drives on local setups. if len(disksInfo) == (rootDiskCount + offlineDisks.Sum()) { // Success. return onlineDisks, offlineDisks } // Root disk should be considered offline for i := range disksInfo { ep := disksInfo[i].Endpoint if disksInfo[i].RootDisk { offlineDisks[ep]++ onlineDisks[ep]-- } } return onlineDisks, offlineDisks }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.1K bytes - Click Count (0) -
internal/rest/client.go
// for ex. connection refused, connection reset, dns resolution failure etc. // All errors returned by storage-rest-server (ex errFileNotFound, errDiskNotFound) are not considered to be network errors. type NetworkError struct { Err error } func (n *NetworkError) Error() string { return n.Err.Error() } // Unwrap returns the error wrapped in NetworkError.Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 14.7K bytes - Click Count (0)